lasso/lasso/xml/private.h

238 lines
7.8 KiB
C

/* $Id$
*
* Lasso - A free implementation of the Liberty Alliance specifications.
*
* Copyright (C) 2004-2007 Entr'ouvert
* http://lasso.entrouvert.org
*
* Authors: See AUTHORS file in top-level directory.
*
* This program is free software; you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation; either version 2 of the License, or
* (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program; if not, write to the Free Software
* Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
*/
#ifndef __LASSO_TOOLS_H__
#define __LASSO_TOOLS_H__
#ifdef __cplusplus
extern "C" {
#endif /* __cplusplus */
#include "xml.h"
#include "xml_enc.h"
#include <xmlsec/crypto.h>
#include <xmlsec/xmlenc.h>
#include "saml-2.0/saml2_encrypted_element.h"
typedef enum {
SNIPPET_NODE,
SNIPPET_CONTENT,
SNIPPET_TEXT_CHILD,
SNIPPET_NAME_IDENTIFIER,
SNIPPET_ATTRIBUTE,
SNIPPET_NODE_IN_CHILD,
SNIPPET_LIST_NODES,
SNIPPET_LIST_CONTENT,
SNIPPET_EXTENSION,
SNIPPET_SIGNATURE,
SNIPPET_LIST_XMLNODES,
SNIPPET_XMLNODE,
/* transformers for content transformation */
SNIPPET_STRING = 1 << 0, /* default, can be omitted */
SNIPPET_BOOLEAN = 1 << 20,
SNIPPET_INTEGER = 1 << 21,
SNIPPET_LASSO_DUMP = 1 << 22,
SNIPPET_OPTIONAL = 1 << 23, /* optional, ignored if 0 */
SNIPPET_OPTIONAL_NEG = 1 << 24, /* optional, ignored if -1 */
SNIPPET_ANY = 1 << 25, /* ##any node */
SNIPPET_ALLOW_TEXT = 1 << 26, /* allow text childs in list of nodes */
SNIPPET_KEEP_XMLNODE = 1 << 27 /* force keep xmlNode */
} SnippetType;
typedef enum {
NO_OPTION = 0,
NO_SINGLE_REFERENCE = 1 /* SAML signature should contain a single reference,
* but WS-Security signatures can contain many */
} SignatureVerificationOption;
struct XmlSnippet {
char *name;
SnippetType type;
guint offset;
char *class_name;
char *ns_name;
char *ns_uri;
};
struct QuerySnippet {
char *path;
char *field_name;
};
struct _LassoNodeClassData
{
struct XmlSnippet *snippets;
struct QuerySnippet *query_snippets;
char *node_name;
xmlNs *ns;
int sign_type_offset;
int sign_method_offset;
int private_key_file_offset;
int certificate_file_offset;
gboolean keep_xmlnode;
};
void lasso_node_class_set_nodename(LassoNodeClass *klass, char *name);
void lasso_node_class_set_ns(LassoNodeClass *klass, char *href, char *prefix);
void lasso_node_class_add_snippets(LassoNodeClass *klass, struct XmlSnippet *snippets);
void lasso_node_class_add_query_snippets(LassoNodeClass *klass, struct QuerySnippet *snippets);
gchar* lasso_node_build_query_from_snippets(LassoNode *node);
gboolean lasso_node_init_from_query_fields(LassoNode *node, char **query_fields);
gboolean lasso_node_init_from_saml2_query_fields(LassoNode *node,
char **query_fields, char **relay_state);
LassoMessageFormat lasso_node_init_from_message_with_format(LassoNode *node, const char *message, LassoMessageFormat constraint, xmlDoc **doc_out, xmlNode **root_out);
typedef enum {
LASSO_PEM_FILE_TYPE_UNKNOWN,
LASSO_PEM_FILE_TYPE_PUB_KEY,
LASSO_PEM_FILE_TYPE_PRIVATE_KEY,
LASSO_PEM_FILE_TYPE_CERT
} LassoPemFileType;
void lasso_build_random_sequence(char *buffer, unsigned int size);
char* lasso_build_unique_id(unsigned int size);
char* lasso_get_current_time(void);
char* lasso_time_to_iso_8601_gmt(time_t now);
time_t lasso_iso_8601_gmt_to_time_t(char *xsdtime);
LassoPemFileType lasso_get_pem_file_type(const char *file);
xmlSecKeyPtr lasso_get_public_key_from_pem_file(const char *file);
xmlSecKeyPtr lasso_get_public_key_from_pem_cert_file(const char *file);
xmlSecKeysMngr* lasso_load_certs_from_pem_certs_chain_file (const char *file);
char* lasso_query_sign(char *query, LassoSignatureMethod sign_method,
const char *private_key_file);
int lasso_query_verify_signature(const char *query, const xmlSecKey *public_key);
int lasso_saml2_query_verify_signature(const char *query, const xmlSecKey *sender_public_key);
char* lasso_sha1(const char *str);
char** urlencoded_to_strings(const char *str);
int lasso_sign_node(xmlNode *xmlnode, const char *id_attr_name, const char *id_value,
const char *private_key_file, const char *certificate_file);
int lasso_verify_signature(xmlNode *signed_node, xmlDoc *doc, const char *id_attr_name,
xmlSecKeysMngr *keys_manager, xmlSecKey *public_key,
SignatureVerificationOption signature_verification_option,
GList **uri_references);
void xmlCleanNs(xmlNode *root_node);
void xml_insure_namespace(xmlNode *xmlnode, xmlNs *ns, gboolean force,
gchar *ns_href, gchar *ns_prefix);
gchar* lasso_node_build_deflated_query(LassoNode *node);
gchar* lasso_node_build_query(LassoNode *node);
gboolean lasso_node_init_from_deflated_query_part(LassoNode *node, char *deflate_string);
xmlNode* lasso_node_get_xmlnode_for_any_type(LassoNode *node, xmlNode *cur);
LassoSaml2EncryptedElement* lasso_node_encrypt(LassoNode *lasso_node,
xmlSecKey *encryption_public_key, LassoEncryptionSymKeyType encryption_sym_key_type, const char *recipient);
int lasso_node_decrypt_xmlnode(xmlNode* encrypted_element, GList *encrypted_key,
xmlSecKey *encryption_private_key, LassoNode **output);
void lasso_node_remove_signature(LassoNode *node);
char* lasso_concat_url_query(const char *url, const char *query);
xmlDocPtr lasso_xml_parse_memory(const char *buffer, int size);
xmlNode* lasso_xml_get_soap_content(xmlNode *root);
gboolean lasso_xml_is_soap(xmlNode *root);
void _debug(GLogLevelFlags level, const char *filename, int line,
const char *function, const char *format, ...);
int error_code(GLogLevelFlags level, int error, ...);
gboolean lasso_eval_xpath_expression(xmlXPathContextPtr xpath_ctx, const char *expression,
xmlXPathObjectPtr *xpath_object_ptr, int *xpath_error_code);
#if defined(LASSO_DEBUG) && defined(__GNUC__)
# define debug(format, args...) \
_debug(G_LOG_LEVEL_DEBUG, __FILE__, __LINE__,__FUNCTION__, format, ##args)
#elif defined(HAVE_VARIADIC_MACROS)
# define debug(...) ;
#else
static inline void debug(const char *format, ...)
{
va_list ap;
va_start(ap, format);
va_end(ap);
}
#endif
#ifndef __FUNCTION__
# define __FUNCTION__ ""
#endif
#if defined(__GNUC__)
# define message(level, format, args...) \
_debug(level, __FILE__, __LINE__, __FUNCTION__, format, ##args)
#elif defined(HAVE_VARIADIC_MACROS)
# define message(level, ...) \
_debug(level, __FILE__, __LINE__, __FUNCTION__, __VA_ARGS__)
#else
static inline void message(GLogLevelFlags level, const char *format, ...)
{
va_list ap;
char s[1024];
va_start(ap, format);
g_vsnprintf(s, 1024, format, ap);
va_end(ap);
_debug(level, __FILE__, __LINE__, __FUNCTION__, s);
}
#endif
#define critical_error(rc) error_code(G_LOG_LEVEL_CRITICAL, rc)
#define IF_SAML2(profile) \
if (lasso_provider_get_protocol_conformance(LASSO_PROVIDER(profile->server)) == \
LASSO_PROTOCOL_SAML_2_0)
char * lasso_get_relaystate_from_query(const char *query);
char * lasso_url_add_parameters(char *url, gboolean free, ...);
xmlSecKey* lasso_xmlsec_load_private_key_from_buffer(const char *buffer, size_t length, const char *password);
xmlSecKey* lasso_xmlsec_load_private_key(const char *filename_or_buffer, const char *password);
xmlDocPtr lasso_xml_parse_file(const char *filepath);
xmlDocPtr lasso_xml_parse_memory_with_error(const char *buffer, int size, xmlError *error);
xmlSecKeyPtr lasso_xmlsec_load_key_info(xmlNode *key_descriptor);
char* lasso_xmlnode_to_string(xmlNode *node, gboolean format, int level);
gboolean lasso_string_to_xsd_integer(const char *str, long int *integer);
#ifdef __cplusplus
}
#endif /* __cplusplus */
#endif /* __LASSO_TOOLS_H__ */